Kepserver Enterprise Rockwellautomation Kepserver Enterprise

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Rockwellautomation Kepserver Enterprise.

By the Year

In 2026 there have been 0 vulnerabilities in Rockwellautomation Kepserver Enterprise. Kepserver Enterprise did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 6 9.18

It may take a day or so for new Kepserver Enterprise vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Rockwellautomation Kepserver Enterprise Security Vulnerabilities

KEPServerEX Unvalidated Client Certs Enable Unauth Connections
CVE-2023-5909 7.5 - High - November 30, 2023

KEPServerEX does not properly validate certificates from clients which may allow unauthenticated users to connect.

Improper Certificate Validation

KEPServerEX Buffer Overflow Enables Crash / Info Leak
CVE-2023-5908 9.1 - Critical - November 30, 2023

KEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information.

Classic Buffer Overflow

RCE in Kepware KEPServerEX 6.11.718.0 via Encoding Buffer Overflow
CVE-2022-2848 9.1 - Critical - March 29, 2023

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX 6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-16486.

Heap-based Buffer Overflow

Remote Code Exec via Stack Buffer Overflow in Kepware KEPServerEX 6.11
CVE-2022-2825 9.8 - Critical - March 29, 2023

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Kepware KEPServerEX 6.11.718.0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of text encoding conversions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-18411.

Stack Overflow

Improper Array Index Validation Enables Remote Code Execution
CVE-2023-0755 9.8 - Critical - February 23, 2023

The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code.

out-of-bounds array index

Integer Overflow in Unknown Server RCE & Crash (CVE-2023-0754)
CVE-2023-0754 9.8 - Critical - February 23, 2023

The affected products are vulnerable to an integer overflow or wraparound, which could allow an attacker to crash the server and remotely execute arbitrary code.

Integer Overflow or Wraparound

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Rockwellautomation Kepserver Enterprise or by Rockwellautomation? Click the Watch button to subscribe.

subscribe